Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Windows Local Administrator Password Solution (Windows LAPS) helps you securely manage local administrator passwords on Windows devices using Microsoft Entra ID or Active Directory. This article explains how to migrate from legacy Microsoft LAPS to Windows LAPS for improved security and management.
It's possible to use both Windows LAPS and legacy LAPS in a side-by-side scenario. For the side-by-side scenario to be successful, both policies must target different local accounts. Your long term goal however should be to migrate away from legacy LAPS to Windows LAPS.
Prerequisites
Before you begin the migration process, ensure that you configured Windows LAPS. For more information, see Get started with Windows LAPS and Microsoft Entra ID or Get started with Windows LAPS and Windows Server Active Directory.
Migration scenarios from legacy LAPS to Windows LAPS on existing devices
Microsoft recommends migrating from legacy LAPS to Windows LAPS. This section describes procedures for accomplishing that migration on existing devices.
There are two basic approaches that can be used. The first approach is an immediate transition, while the second approach uses a period of side-by-side coexistence followed by a final transition.
Immediate transition approach
You can migrate from legacy LAPS to Windows LAPS on existing devices using the following process:
- Disable or remove the legacy LAPS policy.
- Create and apply a Windows LAPS policy.
- Monitor the managed device to confirm a successful transition.
- Remove the legacy LAPS software.
The first two steps should be performed simultaneously (or as nearly so as possible).
The easiest approach when configuring the Windows LAPS policy is to target the same account that was previously targeted in the legacy LAPS policy. If you choose to target a different account, then you need to create the new account before you apply the Windows LAPS policy. The first account should be removed if it's no longer needed.
The Windows LAPS policy might also be configured with features, such as being backed up to Microsoft Entra ID, or enable Active Directory password encryption, that weren't available with legacy LAPS.
When a Windows LAPS policy is first applied, the managed device performs an immediate rotation of the local account password. For more information, see How a Windows LAPS policy is applied to a new client device. You should monitor the managed device to ensure the transition is successful.
Once the transition is complete, the final step should be to remove the legacy LAPS software from the managed device.
Transient side-by-side coexistence approach
You might want to implement a more gradual migration procedure from legacy LAPS to Windows LAPS. The high-level steps to perform this transition on existing devices are as follows:
- Configure the managed device with a second local account.
- Create and apply a Windows LAPS policy.
- Monitor the managed device to confirm a successful application of the Windows LAPS policy.
- Disable or remove the legacy LAPS policy.
- Remove the legacy LAPS software.
- Remove the extra account.
With this approach, you need to create a second local account since having both a Windows LAPS policy and legacy LAPS policy targeting the same account isn't supported.
After confirming that Windows LAPS is working properly, you can leave the managed device in this state for as long as needed before performing the rest of the migration steps.
Monitor a successful transition
There are multiple approaches to monitoring for a successful outcome once you transition a managed device to a Windows LAPS policy:
- You can monitor the managed device's Windows LAPS event log channel for successful password update events (for either Microsoft Entra ID or AD). A centralized event log collection solution can help here.
- When storing passwords in Active Directory, you can look for the appearance of a new or updated
msLAPS-PasswordExpirationTime
attribute on the managed device's AD computer object. TheGet-LapsADPassword
PowerShell cmdlet can be used to automate this analysis. - When storing passwords in Microsoft Entra ID, you can check the Microsoft Entra ID or Intune management portals to verify that the device password is updated. The
Get-LapsAADPassword
PowerShell cmdlet can be used to automate this analysis.
Remove the legacy LAPS software from a managed device
The specific steps required to remove the legacy LAPS software from the managed device depend on how that software was initially installed.
If you installed legacy LAPS using the MSI installer package, you can manually uninstall the legacy LAPS software from add/remove programs, or run the following command from the command line running as an administrator on the device:
msiexec.exe /q /uninstall {97E2CA7B-B657-4FF7-A6DB-30ECC73E1E28}
If you installed legacy LAPS by manually copying and registering the legacy LAPS CSE
AdmPwd.dll
file, you need to manually unregister and then deleteAdmPwd.dll
. Run the following command from the command line running as an administrator on the device. If you copiedAdmPwd.dll
to a different ___location, you need to adjust the path accordingly. You can find the ___location of the file by checking the registry keyHKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}
for theDllName
value.regsvr32.exe /s /u AdmPwd.dll delete C:\windows\system32\AdmPwd.dll